Skip to main content

The scariest thing about cyberwarfare

Home » Opinion

Last Modified: Tue, Jul 11 2017. 01 41 AM IST

The scariest thing about cyberwarfare

Two superpowers may be stepping up a cyberwar without the rules of engagement that protect civilians in conventional wars

Leonid Bershidsky

There’s no cyberwar equivalent of the Geneva and Hague conventions. Photo: iStock

A new report by Bloomberg News about Russia being suspected of hacking a dozen US power plants, including a nuclear one, is far more serious than any possible attempt to influence an election. It could be a sign of something even scarier: two military superpowers stepping up a cyberwar in the shadows and without rules of engagement that protect civilians from other kinds of warfare.

Attacks on power grids have a potential for mass destruction. A temporary power outage doesn’t appear to be all that threatening compared with the use of chemical, biological or nuclear weapons, but blackouts kill people even when they don’t last long. A lasting power grid breakdown could be an apocalyptic scenario, with hospitals and other critical services running out of fuel for reserve generators and unable to obtain it easily; traffic, food and water supplies disrupted; urban life plunged into chaos. And that’s before we even think of nuclear power plants getting out of control.

There is a pervading myth that nuclear facilities are “air gapped”—or completely isolated from the public internet—and that this protects them from cyber attack. Yet not only can air gaps be breached with nothing more than a flash drive (as in the case of Stuxnet), but the commercial benefits of internet connectivity mean that nuclear facilities may now have virtual private networks and other connections installed.

Stuxnet was the malware the US used in its most successful hacking operation to date, the crippling 2010 attack on the Iranian nuclear programme. It’s openly celebrated now as an example of what the US can do to an adversary’s infrastructure if it sets its mind to it. Paranoid security professionals in Russia and elsewhere have long worried about factory-installed backdoors in American-made software and equipment. National Security Agency leaker Edward Snowden revealed a range of such physical and software-based implants.

If Russia is behind the power plant hacks, they could very well be responding to US threats to deploy “implants” in important Russian networks. According to a recent Washington Post report, then president Barack Obama ordered the use of implants on Russian networks that would cause “pain and discomfort if they were disrupted”.

Russia appears to be eager to demonstrate—without admitting it—that it has a similar capability. There’s circumstantial evidence that it has messed with the Ukrainian power grid, causing two brief blackouts. The current attacks on US power plants can only loosely be attributed to any state agents, let alone to Russia, but they reportedly match the profile of earlier attacks by a hacker group which has targeted energy companies in Russia’s adversary nations.

I’ve long written that I consider the story of Russian meddling in last year’s US presidential election overblown. If the actual voting and tabulation weren’t affected—which no one appears to doubt—Americans made up their own minds how to vote; propaganda and the release of stolen emails, Russian or not, are par for the course in election campaigns. Only strong evidence of collusion between Donald Trump’s campaign and the Russian intelligence services could make this a national security problem.

Attacks on civilian services, and especially on nuclear plants, are a different matter. They are unambiguous acts of war. It is known that the US is capable of them, and it would stand to reason that Russia wouldn’t let itself be outdone. Nor would China and smaller players such as Israel or North Korea. And yet there are no rules of engagement for countries that have the capability to shut off each other’s power grids or, say, traffic light systems. There’s no cyberwar equivalent of the Geneva and Hague conventions, which set rules for the treatment of civilians and ban certain kinds of cruel weapons.

In the so-called Tallinn Manual, originally published in 2013, a group of experts working for the North Atlantic Treaty Organization (Nato) attempted to lay down some rules, warning against attacks on critical infrastructure. It specifically named hospitals and nuclear power plants as facilities that should be out of bounds. But the manual is not even an official Nato document.

In February, the United Nations Security Council unanimously adopted Resolution 2341 calling on states to arm themselves against terrorist attacks on critical infrastructure. But what about such attacks initiated by other governments, not terror groups? It’s time there were some internationally recognized principles that applied to them, defining, for example, what constitutes an attack, what response is permissible, and what can and cannot be done to civilian networks. It would be helpful to establish some international attribution mechanism; a nation’s intelligence services cannot be trusted to make an assessment that would be used to justify international sanctions.

Conventions have often been broken in wartime. Some countries still make and use chemical and biological weapons, even if they won’t openly admit it. Some militaries mistreat prisoners and kill civilians. But rules of engagement are still useful: most belligerent parties aim to act honourably and avoid being branded as war criminals. Official cyberwar rules wouldn’t stop attacks, but they would define unacceptable behaviour for all concerned. These rules are necessary before the US, Russia and China go after each other with all they’ve got, which is more than we know. Bloomberg View 

Leonid Bershidsky is a Bloomberg View columnist.

Comments are welcome at theirview@livemint.com

Leonid Bershidsky

Topics: cyber warfarehackingnuclear plant hackingTallinn ManualUS


Comments

Popular posts from this blog

Russian Central Bank planning their own #cryptocurrency 😱😱😱

Russian Central Bank planning their own #cryptocurrency 😱😱😱 Speaking at the 2017 St. Petersburg International Economic Forum today, deputy chairwoman of Russia’s central bank Olga Skorobogatova has, in a significant revelation, stated that the regulator is working on a national digital currency. According to a report by TASS, Russia’s largest news agency, Skorobogatova sees national cryptocurrencies as the future and claimed that it’s merely a matter of time before countries around the world adopt national digital currencies. She stated: " Regulators of all countries agree that it’s time to develop national cryptocurrencies, this is the future. Every country will decide on specific time frames. After our pilot projects, we will understand what system we could sue in our case for our national currency. "

50 HIGH PR FORUMS AND BOOKMARKING SITES FOR BACKLINKS

50 HIGH PR FORUMS AND BOOKMARKING SITES FOR BACKLINKS http://answers.microsoft.com/en-us http://archiveoflinks.com / http://community.sitepoint.com / http://de.lirio.us / http://del.icio.us / http://dondir.com / http://filesharingtalk.com / http://forum.deviantart.com / http://forum.joomla.org / http://forums.cnet.com / http://forums.hostgator.com / http://forums.mysql.com / http://forums.searchenginewatch.com / http://simplemachines.org/community/index.php http://www.247webdirectory.com / http://www.2daydir.com / http://www.9dir.com/Submit http://www.9sites.net / http://www.9w1.net / http://www.a1webdirectory.org / http://www.abacusseo.com / http://www.abc-directory.com / http://www.abigdir.com / http://www.acewebdirectory.com / http://www.add2us.com / http://www.addbusiness.net / http://www.addlink.us / http://www.addlinkzfree.com / http://www.addsite.info / http://www.afreeurl.info / http://www.agrieducation.org / http://www.alistdirectory.com / http

Blogs on Computer Security:

Blogs on Computer Security: https://antelox.blogspot.com / http://www.dumpanalysis.org/blog / http://www.abuse.ch / http://zairon.wordpress.com / http://androguard.blogspot.com / http://blog.w4kfu.com / http://akhenath0n.blogspot.com / http://diarrlf.wordpress.com / http://deobfuscated.blogspot.com / http://www.h-i-r.net / http://mysterie.fr/blog / http://www.skullsecurity.org/blog / http://www.wrgross.com/blogs/security / http://net-effects.blogspot.com / http://eiploader.wordpress.com / http://cyb3rsleuth.blogspot.com / http://0entropy.blogspot.com / http://siri-urz.blogspot.com / http://newsoft-tech.blogspot.com / http://www.ragestorm.net/blogs / http://codeexploration.blogspot.com / http://esploit.blogspot.com / http://thexploit.com / http://mysterie.fr/blog / http://bailey.st/blog / http://touchmymalware.blogspot.ru / http://blog.delroth.net / http://novahackers.blogspot.com / http://greatis.com/blog / http://mcdermottcybersecurity.com / http://grand
200++ high pr eductinon&goverment site backline As We know how important backlinks are for rankings in Google for a blog/site and page rank which definitely is the trusted way to show how well your blog is which most advertiser look for.I have come up with top .gov & .edu website by registering where you can get backlinks easily.Sograb these backlinsk and see the magic how  your website ranks on Google with these high PR boosting .gov and .edu backlinks.A high quality backlinks worth thousands low quality backlinks, especially the one coming fromedu and .gov sites. Google loves backlinks from.edu & .gov sites and thus give your site good ranking in SERPs. An edu & .’gov backlinks is associated with an educational institute & government organization therefore considered asmost authentic and valued backlink in term of SEO because they are from non-profit source givequality information, not a spam one and since exists for long time in the field, have high PageRank t

Tor Darkweb Link

Tor link max telegram big acker: https://cardedlxzxsphu5y.onion/ SHOP FOR BUYING CARDED PRODUCTS https://2or24opd2hkebadv.onion/index.php  TORBAY FORUM chickencaptain: http://kpynyvym6xqi7wz2.onion/ parazite files and links max telegram big acker: https://kr5hou2zh4qtebqk.onion.cab/ezines/ ARCHIEVE OF SOME VINTAGE AS WELL AS NEW STUFFS https://superkuhbitj6tul.onion/library/ LIBRARY OF BOOKS ON VARIOUS TOPICS https://yuxv6qujajqvmypv.onion/ GUIDE ON USING AN SECURE OPERATING SYSTEM https://bpo4ybbs2apk4sk4.onion/en A COLLECTION OF TOOLS RELATED TO SECURITY P4RN3R: https://ondemand5xot4hdw.onion/  Tor On Demand max telegram big acker: https://f3mnl42ax3qtu3a7.onion/ GOVT LEAKS https://kzspryu63qbjfncp.onion/  DIGITAL PAWN SHOP https://yniir5c6cmuwslfl.onion/ STRANGE WEBSITE, CANT DESCRIBE https://vrimutd6so6a565x.onion.cab/index.php/Board ANONYMOUS POSTING https://h2am5w5ufhvdifrs.onion/ CRYPTOME ARCHIVE OF GOV CONSPIRACY FILES https://torc5bhzq6xorhb4.onion/ TURKISH

How to Hack Website

inurl:/editor/editor/filemanager Just open uploadtest.html Or test.html Then select PHP server Upload file Copy uploaded file url Paste it after the link Www.xyz.com //.... Enjoy Regards :- HACKER 22385

open a new bitcoin account and made double money

open a new bitcoin account and made double money MenuAbout UsContact Us Privacy Policy Disclaimer Sitemap  Main MenuBlogging tipsBlog designing  Blog traffic How TosMake Money Online  How to open a bitcoin account, earn, double your earnings and withdraw your money to physical cash. Bloggers Prof 11:12:00 AM  4 I recently discovered that people are now interested in bitcoin because of its high rate of popularity now in telegram, but nevertheless, I would be talking today on  how to get money into your bitcoin wallet  and how to go about your funds, weather you would withdraw it or you sell it to someone, I talked about everything you need to know about bitcoin and how to create your wallet, create your wallet let's move to today's deal. There are many ways to get  money into your wallet,   you can buy and you can also earn it , I want to show you list of sites you can earn bits from fast, After so many online research on how to get free bitcoins, I came across many we

List of IP range for RDP cracking

MR_Liosion: Range IP AMAZON 8.18.144.0 - 8.18.144.255 8.18.145.0 - 8.18.145.255 79.125.0.0 - 79.125.63.255 216.137.32.0 - 216.137.63.255 207.171.160.0 - 207.171.191.255 23.20.0.0 - 23.23.255.255 107.20.0.0 - 107.23.255.255 184.72.0.0 - 184.73.255.255 72.21.192.0 - 72.21.223.255 50.16.0.0 - 50.19.255.255 199.255.192.0 - 199.255.195.255 67.202.0.0 - 67.202.63.255 204.236.128.0 - 204.236.255.255 75.101.128.0 - 75.101.255.255 174.129.0.0 - 174.129.255.255 79.125.64.0 - 79.125.127.255 204.246.160.0 - 204.246.191.255 184.169.128.0 - 184.169.255.255 50.112.0.0 - 50.112.255.255 54.240.0.0 - 54.255.255.255 72.44.32.0 - 72.44.63.255 176.32.64.0 - 176.32.71.255 87.238.84.0 - 87.238.85.255 205.251.192.0 - 205.251.255.255 178.236.0.0 - 178.236.7.255 87.238.86.0 - 87.238.87.255 87.238.80.0 - 87.238.81.255 103.4.12.0 - 103.4.15.255 103.4.8.0 - 103.4.11.255 87.238.82.0 - 87.238.83.255 176.32.80.0 - 176.32.87.255 27.0.0.0 - 27.0.3.255 17

hacking tools and lab

Resources (Free) Virtual Networks (VPNs) • ChaosVPN: http://wiki.hamburg.ccc.de/ChaosVPN • Gh0st Networks: http://www.gh0st.net / • Hacking Lab: https://www.hacking-lab.com / • p0wnlabs: http://p0wnlabs.com / • pwn0: https://pwn0.com / • PentestIT: https://lab.pentestit.ru / Custom Personal Targets • Hack A Server: https://hackaserver.com / • Hack Me: http://hack.me / • Hack This: https://www.hackthis.co.uk / • Smash The Stack: http://smashthestack.org / • Hack The Box: https://www.hackthebox.gr / • SecAdvise: https://labs.secadvise.com / • DarkHive: http://darkhive.net / • Avatao: https://avatao.com / • Root-Me: https://www.root-me.org / Archive/Repository • Security Conference Library: http://archive.liquidmatrix.org / • Shell-Storm.org Repository: http://repo.shell-storm.org/CTF / Misc • Bug crowd: http://bugcrowd.com / • CTF Time: http://ctftime.org / • CTF365: http://ctf365.com / • Hacker Cons: http://hackercons.org / • Hat Force: https://www.hatforce.c